Data processing: database and file management or data structures – Database design – Data structure types
Reexamination Certificate
2007-02-08
2009-10-20
Vital, Pierre M (Department: 2156)
Data processing: database and file management or data structures
Database design
Data structure types
C707S793000, C707S793000, C713S178000, C715S255000, C715S272000
Reexamination Certificate
active
07606795
ABSTRACT:
A correctness verification system receives a query, executes the query using a query logic, and produces a query result. The query result comprises data records that satisfy the query, data verification objects associated with the data records, index segments accessed during the execution of the query, index verification objects associated with the index segments, and the query. The system transfers the query result to a verification system. The verification system verifies correctness of the query result by executing the query using the query logic. The verification system uses the data verification objects to verify integrity of the data objects, uses the index verification objects to verify the integrity of the index segments, and uses the index verification objects and the data verification objects to verify the completeness of the query result.
REFERENCES:
patent: 5136647 (1992-08-01), Haber et al.
patent: 6021491 (2000-02-01), Renaud
patent: 6976165 (2005-12-01), Carpentier et al.
patent: 7096493 (2006-08-01), Liu
patent: 2004/0039917 (2004-02-01), Ross
patent: 2005/0273592 (2005-12-01), Pryor et al.
patent: 2006/0112096 (2006-05-01), Ahluwalia et al.
patent: 2006/0206669 (2006-09-01), Zhu et al.
patent: 2006/0248052 (2006-11-01), Zurek
patent: 2006/0259459 (2006-11-01), Wu et al.
patent: 2007/0028307 (2007-02-01), Murison et al.
Verifying Completeness of Relational Query Results in Data Publishing, SIGMOD Jun. 14-15, 2006, Pang et al.
Verified query results from hybrid authentication tress, Glen et al, Data and application security 2005, LNCS 3654, pp. 84-98, 2005.
Authenticating query results in edge computing, Pang et al, proceedings of the 20th international conference on data engineering (ICDE'04).
An approach to ensure integrity of outsourced databases using signature aggregation and chaining, Narasimha et al, school of information and computer science, University of California (2005).
Authentic third-party data publication, Devanbu et al, department of computer science, University of California (1999).
Stein, C.A. et al., “Unifying File System Protection”, Jun. 2000, Proceedings of the 2001 USENIX Annual Technical Conference, pp. 79-90.
Ashar, S.M. et al., “Message Encryption With Image Processing”, Dec. 2003, Proceedings INMIC 2003, 7th International Multi-Topic Conference, pp. 7-15.
Mahimkar, A. et al., “SECUREDAV: A Secure Data Aggregation and Verification Protocol for Sensor Networks”, Dec. 2004, Globecom '04 IEEE Global Telecommunications Conference, vol. 4, pp. 2175-2179.
Liophanich, C., “An Automatic E-Evidence Archival System”, Aug. 2005, 2005, 3rd IEEE International Conference on Industrial Informatics (INDIN), pp. 209-214.
Hsu Windsor Wee Sun
Ma Xiaonan
International Business Machines - Corporation
Kassatly Samuel A.
Obisesan Augustine
Shimokaji & Associates P.C.
Vital Pierre M
LandOfFree
System and method for verifying the integrity and... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System and method for verifying the integrity and..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for verifying the integrity and... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4120878